Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings

نویسندگان

  • Jinhui Chao
  • Osamu Nakamura
  • Kohji Sobataka
  • Shigeo Tsujii
چکیده

Elliptic curves over number elds with CM can be used to design non-isogenous elliptic cryptosystems over nite elds e ciently. The existing algorithm to build such CM curves, so-called the CM eld algorithm, is based on analytic expansion of modular functions, costing computations of O(2 5h=2 h 21=4 ) where h is the class number of the endomorphism ring of the CM curve. Thus it is e ective only in the small class number cases. This paper presents polynomial time algorithms in h to build CM elliptic curves over number elds. In the rst part, probabilistic probabilistic algorithms of CM tests are presented to nd elliptic curves with CM without restriction on class numbers. In the second part, we show how to construct ring class elds from ray class elds. Finally, a deterministic algorithm for lifting the ring class equations from small nite elds thus construct CM curves is presented. Its complexity is shown as O(h 7 ).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Minimal Cm Liftings of Supersingular Elliptic Curves

In this paper, we give a ‘direct’ construction of the endomorphism ring of supersingular elliptic curves over a prime field Fp from ‘ideal classes’ of Q( √−p). We use the result to prove that the result of Kaneko on ‘minimal’ CM liftings of such supersingular elliptic curves is a best possible result. We also prove that the result of Elkies on ‘minimal’ CM liftings of all supersingular elliptic...

متن کامل

Efficient elliptic curve cryptosystems

Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...

متن کامل

On classical Saito-Kurokawa liftings

There exist two different generalizations of the classical Saito–Kurokawa lifting to modular forms with (square-free) level; one lifting produces modular forms with respect to Γ0(m), the other one with respect to the paramodular group Γ(m). We shall give an alternative and unified construction of both liftings using group theoretic methods. The construction shows that a single elliptic modular ...

متن کامل

An efficient blind signature scheme based on the elliptic curve discrete logarithm problem

Elliptic Curve Cryptosystems (ECC) have recently received significant attention by researchers due to their high performance such as low computational cost and small key size. In this paper a novel untraceable blind signature scheme is presented. Since the security of proposed method is based on difficulty of solving discrete logarithm over an elliptic curve, performance of the proposed scheme ...

متن کامل

Diffie-Hellman type key exchange protocols based on isogenies

‎In this paper‎, ‎we propose some Diffie-Hellman type key exchange protocols using isogenies of elliptic curves‎. ‎The first method which uses the endomorphism ring of an ordinary elliptic curve $ E $‎, ‎is a straightforward generalization of elliptic curve Diffie-Hellman key exchange‎. ‎The method uses commutativity of the endomorphism ring $ End(E) $‎. ‎Then using dual isogenies‎, ‎we propose...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998